Q: How much reduction in R&D phase iteration time can one expect with Sustanalyze software tool?
Conventionally it can take anywhere between 6 – 18 months for basic problem discovery as a chemical process moves forward through the stage gate process. This results in longer or even absent iteration loops in some cases. Backed by data and analytical methodology the Sustanalyze software tool can reduce the time for basic problem discovery ranges from 0.5 – 2 months. Also once a chemical process is setup almost instantaneous iterations can be performed in which people from different departments along the stage gate process can also efficiently contribute.
Q: Are the analysis methods used by Sustanalyze transparent?
The analysis methods used by us are proven and have been published in leading peer reviewed scientific journals. Also some of the case study results have been published. Please refer to the Publications section in Resources.
Q: How do you ensure the quality of data?
Our dedicated Data analysts collect relevant data from a variety of quality assured data sources. Our integrated data collection ensures that the data collected for a particular chemical is harmonized across the variety of different domains. The collected data is verified for accuracy and changes at regular intervals. In case of changes/improvements in data values, users of those data points are immediately notified with a summary and reasons behind the changes. Data for conversion processes is collected from scientific resources to ensure quality and are also presented in a transparent manner within the software tool for the convenience of the user.
Q: How do you ensure the security of the data that we put in to the software?
We share your concerns regarding data security and the need to safeguard your innovations. Please refer to our data policy for information on how we handle your data. If you have additional concerns please get in touch and we will be happy to address them. We can also work with you to explore options for software deployment that complies with security policies within your information technology reference architecture.